Digital Forensics & Incident Response — Workstation
// Anonymized sample — B2B Guest Account pattern { "email": "alice.Martin_example.fr#EXT#@demo.onmicrosoft.com", "nom": "Alice Martin", "phone": "+33612345678" } // Key indicator: #EXT# suffix = Azure AD B2B Guest // Host tenant: epitechfr.onmicrosoft.com // Origin domain: @iseg.fr (external partner)
Directory.Read.AllUser.Read.AllContacts.ReadRogue app with admin/user consent granting excessive directory read permissions
Stolen access token with Directory.Read.All and User.Read.All scopes
PowerShell/REST script chaining Graph API calls for mass directory extraction
"Protect your data." Has the CNIL actually done anything today? NO— Accompanied by CNIL logo, indicating anti-regulatory stance